Vulnerability Description
OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted requests can bypass authentication and access protected API endpoints without valid credentials. Unauthorized access may allow modification of feature flags and export of sensitive data.
Related Weaknesses (CWE)
References
- https://dreyand.rs/code%20review/golang/2026/01/03/0day-speedrun-openflagr-less-
- https://github.com/openflagr/flagr/releases/tag/1.1.19
- https://www.vulncheck.com/advisories/openflagr-authentication-bypass-via-prefix-
FAQ
What is CVE-2026-0650?
CVE-2026-0650 is a documented vulnerability. OpenFlagr versions prior to and including 1.1.18 contain an authentication bypass vulnerability in the HTTP middleware. Due to improper handling of path normalization in the whitelist logic, crafted r...
How severe is CVE-2026-0650?
CVSS scoring is not yet available for CVE-2026-0650. Check NVD for updates.
Is there a patch for CVE-2026-0650?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.